OS X was first released to the public over a decade ago as Mac
OS X Beta (code-named Kodiak). The decade after that saw
Mac OS X go from an interesting oddity unsuited to daily work
to a usable operating system with little third-party support to
everything most people want out of an operating system and a...
IOS DEVICES PROVIDE DEVELOPERS with a unique and exciting platform for making games. The
iPhone gives gamers a tiny computer in their pocket that they have with them all the time. The iPad
provides a similar gameplay experience but with a larger screen, more processing power, and more
memory. The devices allow for unique control...
It is demonstrated that spectral characteristics of steady-state visual
evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI)
depend significantly on the stimulus parameters, such as color and frequency of its
flashing light. We postulate these dependencies can be used to improve the BCI
performance –...
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...
Several modifications have been incorporated into the text in the light of recent
advances in some aspects of the subject. Further information on the interesting phenomenon
of cavitation has been included and a new section on the optimum design of
a pump inlet together with a worked example have been added which take into account...
Over the last two or three decades, elliptic curves have been playing an increasingly
important role both in number theory and in related fields such as
cryptography. For example, in the 1980s, elliptic curves started being used
in cryptography and elliptic curve techniques were developed for factorization
and primality...
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of
seven interesting, real-life software security vulnerabilities I found over
the past several years. Each chapter focuses on one bug. I’ll explain
how I found the bug, the steps I took to exploit it, and how the vendor...
Is “provisioning a web server in 5 minutes for $5” the most
interesting thing about the cloud?
Those responsible for IT in their enterprise are quickly
discovering that the cloud is a game-changing trend that
offers a completely new methodology for service provision.
The cloud not only lets you cut...
The Shelly Cashman Series® offers the fi nest textbooks in computer
education. This book is our answer to the many requests we have
received from instructors and students for a textbook that provides a
succinct, yet thorough, introduction to computers.
This book teaches you to create your own games for Android 3.0 tablets. After reading and working
through its examples, you’ll have gained command over the sensors, touchscreen, network capabilities,
and processing power of the many new tablet computers. Does that sound daunting? It isn’t. Instead of
going through the...
The HTML5 canvas is revolutionizing graphics and visualizations on the Web. Powered
by JavaScript, the HTML5 Canvas API enables web developers to create visualizations
and animations right in the browser without Flash. Although the HTML5 Canvas is quickly
becoming the standard for online graphics and interactivity, many developers fail...